Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,404 Article Results

Multi-input DC-AC Inverter for Hybrid Renewable Energy Power System

10.11591/ijece.v6i1.pp40-52
Mohd Azman Rosli , Nor Zaihar Yahaya , Zuhairi Baharudin
The objective of this paper is to design a multi-input dc-ac inverter integrated photovoltaic array, wind turbine and fuel cell in order to simplify the hybrid power system and reduce the cost.  The output power characteristics of the photovoltaic array, wind turbine and fuel cell are introduced. The operational principle and technical details of the proposed multi-input dc-ac inverter is then explained. The proposed inverter consists of a three input flyback dc-dc converter and a single phase full bridge dc-ac inverter. The control strategy for the proposed inverter to distribute the power reasonably to the sources and it achieved a priority of the new energy utilization is discussed. This multi-input dc-ac inverter is capable of being operated in five conditions and power delivered to the ac load can be either individually or simultaneously. First to third condition occurs when the power delivered from either renewable energy sources individually, fourth condition happens when power is demanded from two sources simultaneously, and finally when power are available from three sources simultaneously. The proposed inverter has been simulated by employing NI Multisim 12.0 circuit simulator.
Volume: 6
Issue: 1
Page: 40-52
Publish at: 2016-02-01

Analysis of Ionospheric foF2 by Solar Activity over the Korean Peninsula

10.11591/ijece.v6i1.pp71-81
Min-Ho Jeon , Chang-Heon Oh
The F2 layer is the upper sector of the ionospheric F region, and it is ~250 km above sea level. It has a high electron density and thus plays an important role in shortwave communications. The variations of the critical frequency of the F2 layer (foF2) offer clues regarding the events happening within the entire F2 layer, and foF2 analysis is essential for stable shortwave communications. This study analyzes the seasonal and annual variations of the foF2 as well as the reactions of the F2 layer height at two locations in South Korea by employing the mean and standard deviation (SD) used in previous studies. To ensure a more elaborate analysis, the median and quartiles were used for analyzing the ionosphere. We thereby compensate for the limitations of the mean and SD in developing the SD, despite the convenience of the SD for probability analysis. The application of the median and quartiles for the analysis of ionospheric data led to analysis results with greater detail. This was achieved by determining the relative SD and concurrently displaying the outliers and range of variations
Volume: 6
Issue: 1
Page: 71-81
Publish at: 2016-02-01

Path Planning Based on Fuzzy Decision Trees and Potential Field

10.11591/ijece.v6i1.pp212-222
Iswanto Iswanto , Oyas Wahyunggoro , Adha Imam Cahyadi
The fuzzy logic algorithm is an artificial intelligence algorithm that uses mathematical logic to solve to by the data value inputs which are not precise in order to reach an accurate conclusion. In this work, Fuzzy decision tree (FDT) has been designed to solve the path planning problem by considering all available information and make the most appropriate decision given by the inputs. The FDT is often used to make a path planning decision in graph theory. It has been applied in the previous researches in the field of robotics, but it still shows drawbacks in that the robot will stop at the local minima and is not able to find the shortest path. Hence, this paper combines the FDT algorithm with the potential field algorithm. The potential field algorithm provides weight to the FDT algorithm which enables the robot to successfully avoid the local minima and find the shortest path.
Volume: 6
Issue: 1
Page: 212-222
Publish at: 2016-02-01

3LRM-3 Layer Risk Mitigation Modelling of ICT Software Development Projects

10.11591/ijece.v6i1.pp349-356
Salma Firdose , L. Manjunath Rao
With the adoption of new technology and quality standards, the software development firms are still encountering the critical issues of risk modelling. With the changing dynamics of customer needs, potential competition has being mushrooming in the global IT markets to relay a new standard of software engineering which has higher capability of sustaining risk.  However, till date, it is still theoretical to large extent from research viewpoint. Hence, this paper presents a mathematical model called as 3LRM that is designed with the simple approach keeping in mind the real-time issues of risk factors in software engineering for ICT software development project. The study has also identified requirement volatility as one of the prominent source of risk and hence, the framework intends to identify a risk as well as mitigating the risk to a large extent. The paper is illustrated with some of the simple statistical approaches of random probability.
Volume: 6
Issue: 1
Page: 349-356
Publish at: 2016-02-01

Modeling and Simulation of MPPT-SEPIC Combined Bidirectional Control Inverse KY Converter Using ANFIS in Microgrid System

10.11591/ijeecs.v1.i2.pp264-272
Soedibyo Soedibyo , Farid Dwi Murdianto , Suyanto Suyanto , Mochamad Ashari , Ontoseno Penangsang
Photovoltaic system (PV) is widely used in various renewable energy application. The main problem of PV system is how to get the maximum output power which is integrated in microgrid system. Furthermore, the redundancy output power generated by on a distribution system should also be considered. This study utilizes the excess power for energy storage using bidirectional of KY inverse converter. Since the DC voltage which generated by PV and the energy storage will be converted into AC voltage using inverter toward load. This paper proposes ANFIS as search optimization method using SEPIC converter with a maximum efficiency of 99.95% to impact to power generation performance  in microgrid system.
Volume: 1
Issue: 2
Page: 264-272
Publish at: 2016-02-01

Three Dimensional Space Vector Modulation Theory: Practices without Proofs

10.11591/ijece.v6i1.pp21-25
Bhaskar Bhattacharya , Ajoy Kumar Chakraborty
In three dimensional (3D) space vector modulation (SVM) theory with α-β-γ frame there are some issues which are well known and are widely practiced being quite obvious but without any proof so far. In this paper necessary scientific foundations to those issues have been provided. The foremost of these issues has been with the frame of reference to be considered in 3D SVM applications for unbalanced three phase systems. Although for balanced three phase systems there has been no controversy with α-β frame as the frame of reference but in 3D it has not yet been established which one, α-β-γ frame or the a-b-c frame, is mathematically correct. Another significant issue addressed in this work has been to ascertain the exact reason when a three phase system has to be represented in 2D or 3D space to apply SVM. It has been presented for the first time in this work that the key factor that determines whether 3D or 2D SVM has to be applied depends on the presence of time independent symmetrical components in a three phase ac system. Also it has been proved that the third axis, the Y–axis, represents the time independent quantity and that it must be directed perpendicular to the α-β plane passing through the origin.
Volume: 6
Issue: 1
Page: 21-25
Publish at: 2016-02-01

Defect Detection in Ceramic Images Using Sigma Edge Information and Contour Tracking Method

10.11591/ijece.v6i1.pp160-166
Kwang-Baek Kim , Young Woon Woo
In this paper, we suggest a method of detecting defects by applying Hough transform and least squares on ceramic images obtained from non-destructive testing. In the ceramic images obtained from non-destructive testing, the background area, where the defect does not exist, commonly shows gradual change of luminosity in vertical direction. In order to extract the background area which is going to be used in the detection of defects, Hough transform is performed to rotate the ceramic image in a way that the direction of overall luminosity change lies in the vertical direction as much as possible. Least squares is then applied on the rotated image to approximate the contrast value of the background area. The extracted background area is used for extracting defects from the ceramic images. In this paper we applied this method on ceramic images acquired from non-destructive testing. It was confirmed that extracted background area could be effectively applied for searching the section where the defect exists and detecting the defect.
Volume: 6
Issue: 1
Page: 160-166
Publish at: 2016-02-01

Several Mode-Locked Pulses Generation and Transmission over Soliton Based Optical Transmission Link

10.11591/ijeecs.v1.i2.pp288-293
IS Amiri , SE Alavi
A soliton-based optical communication system is presented to generate and transmits several mode locked laser pulses (generated by fiber laser setup) over 50 km fiber and 120 m wireless link. The passive mode-locking feature of the laser system proposed in this paper is based on nonlinear polarization rotation evolution.
Volume: 1
Issue: 2
Page: 288-293
Publish at: 2016-02-01

High throughput FPGA Implementation of Data Encryption Standard with time variable sub-keys

10.11591/ijece.v6i1.pp298-306
Soufiane Oukili , Seddik Bri
The Data Encryption Standard (DES) was the first modern and the most popular symmetric key algorithm used for encryption and decryption of digital data. Even though it is nowadays not considered secure against a determined attacker, it is still used in legacy applications. This paper presents a secure and high-throughput Field Programming Gate Arrays (FPGA) implementation of the Data Encryption Standard algorithm. This is achieved by combining 16 pipelining concept with time variable sub-keys and compared with previous illustrated encryption algorithms. The sub-keys vary over time by changing the key schedule permutation choice 1. Therefore, every time the plaintexts are encrypted by different sub-keys. The proposed algorithm is implemented on Xilinx Spartan-3e (XC3s500e) FPGA. Our DES design achieved a data encryption rate of 10305.95 Mbit/s and 2625 number of occupied CLB slices. These results showed that the proposed implementation is one of the fastest hardware implementations with much greater security.
Volume: 6
Issue: 1
Page: 298-306
Publish at: 2016-02-01

Incremental Tag Suggestion for Landmark Image Collections

10.11591/ijece.v6i1.pp139-150
Sutasinee Chimlek , Punpiti Piamsa-nga
In recent social media applications, descriptive information is collected through user tagging, such as face recognition, and automatic environment sensing, such as GPS. There are many applications that recognize landmarks using information gathered from GPS data. However, GPS is dependent on the location of the camera, not the landmark. In this research, we propose an automatic landmark tagging scheme using secondary regions to distinguish between similar landmarks. We propose two algorithms: 1) landmark tagging by secondary objects and 2) automatic new landmark recognition. Images of 30 famous landmarks from various public databases were used in our experiment. Results show increments of tagged areas and the improvement of landmark tagging accuracy.
Volume: 6
Issue: 1
Page: 139-150
Publish at: 2016-02-01

Projected Range Dependent Tunneling Current of Asymmetric Double Gate MOSFET

10.11591/ijece.v6i1.pp113-119
Hak Kee Jung
This study is to analyze the changes of tunneling current according to projected range, a variable of Gaussian function of channel doping function of Asymmetric Double Gate; ADG MOSFET. In MOSFET with channel length below 10 nm, tunneling current occupies a large percentage among off-currents. The increase of tunneling current has a large effect on the characteristics of subthreshold such as threshold voltage movement and the decline of subthreshold swing value, so the accurate analysis of this is being required. To analyze this, potential distribution of series form was obtained using Gaussian distribution function, and using this hermeneutic potential distribution, thermionic emission current and tunneling current making up off-current were obtained. At this point, the effect that the changes of projected range, a variable of Gaussian distribution function, have on the ratio of tunneling current among off-currents was analyzed. As a result, the smaller projected range was, the lower the ratio of tunneling current was. When projected range increased, tunneling current increased largely. Also, it was observed that the value of projected range which the ratio of tunneling current increased changed according to maximum channel doping value, channel length, and channel width.
Volume: 6
Issue: 1
Page: 113-119
Publish at: 2016-02-01

A Polynomial Digital Pre-Distortion Technique Based on Iterative Architecture

10.11591/ijece.v6i1.pp106-112
Kwang-Pyo Lee , Soon-Il Hong , Eui-Rim Jeong
A digital predistortion (DPD) technique based on an iterative adaptation structure is proposed for linearizing power amplifiers (PAs). To obtain proper DPD parameters, a feedback path that converts the PA’s output to a baseband signal is required, and memory is also needed to store the baseband feedback signals. DPD parameters are usually found by an adaptive algorithm by using the transmitted signals and the corresponding feedback signals. However, for the adaptive algorithm to converge to a reliable solution, long feedback samples are required, which increases hardware complexity and cost. Considering that the convergence time of the adaptive algorithm highly depends on the initial condition, we propose a DPD technique that requires relatively shorter feedback samples. Specifically, the proposed DPD iteratively utilizes the short feedback samples in memory while keeping and using the DPD parameters found at the former iteration as the initial condition at the next iteration. Computer simulation shows that the proposed technique performs better than the conventional technique, as the former requires much shorter feedback memory than the latter.
Volume: 6
Issue: 1
Page: 106-112
Publish at: 2016-02-01

Network Activity Monitoring Against Malware in Android Operating System

10.11591/ijece.v6i1.pp249-256
Luis Miguel Acosta-Guzman , Gualberto Aguilar-Torres , Gina Gallegos-Garcia
Google’s Android is the most used Operating System in mobile devices but as its popularity has increased hackers have taken advantage of the momentum to plague Google Play (Android’s Application Store) with multipurpose Malware that is capable of stealing private information and give the hacker remote control of smartphone’s features in the worst cases. This work presents an innovative methodology that helps in the process of malware detection for Android Operating System, which addresses aforementioned problem from a different perspective that even popular Anti-Malware software has left aside. It is based on the analysis of a common characteristic to all different kinds of malware: the need of network communications, so the victim device can interact with the attacker. It is important to highlight that in order to improve the security level in Android, our methodology should be considered in the process of malware detection. As main characteristic, it does not need to install additional kernel modules or to root the Android device. And finally as additional characteristic, it is as simple as can be considered for non-experienced users.
Volume: 6
Issue: 1
Page: 249-256
Publish at: 2016-02-01

Implementing Dynamically Evolvable Communication with Embedded Systems through WEB Services

10.11591/ijece.v6i1.pp381-398
Sasi Bhanu Jammalamadaka , Vinaya Babu A , Trimurthy A
Embedded systems that monitor and control safety and mission critical system are communicated with by a HOST located at a remote location through Internet. Such kind of embedded systems are developed to be dynamically evolvable with respect to syntax, semantics, online testing and communication subsystems. All these systems are to be dynamically evolvable and the components needed for evolution are also to be added into the embedded system. Architectural  models describe  various components using which dynamically evolvable sub-systems are realised through implementation by using specific and related technologies. Implementation system describe the platform, code units and the interlacing of various processes/tasks to the elementary level of details. WEB services place an excellent platform for implementing dynamically evolvable  systems due to the use of open standards. This paper presents an implementation system that is related to dynamically evolvable communication and other sub-systems using web services technologies.
Volume: 6
Issue: 1
Page: 381-398
Publish at: 2016-02-01

Application of Component Criticality Importance Measures in Design Scheme of Power Plants

10.11591/ijece.v6i1.pp63-70
Smajo Bisanovic , Mersiha Samardzic , Damir Aganovic
This paper presents application of component criticality importance measures in phase of preparation and design of power plants. These measures provide a numerical rank to determine which components are more important for power plant reliability improvement or more critical for power plant failure. Identifying critical components for power plant reliability provides an important input for decision-making and guidance throughout the development project. The study on several schematic design options of conventional thermal power plant show that the importance measures can be used as an effective tool to assess component criticality in the project phase of new production capacities.
Volume: 6
Issue: 1
Page: 63-70
Publish at: 2016-02-01
Show 1508 of 1827

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration